{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:59Z","timestamp":1725471779522},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_1","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T14:51:56Z","timestamp":1160578316000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Computing of Trust in Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11429760_9","volume-title":"Trust Management","author":"I. Agudo","year":"2005","unstructured":"Agudo, I., L\u00f3pez, J., Montenegro, J.A.: A Representation Model of Trust Relationships with Delegation Extensions. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 116\u2013130. Springer, Heidelberg (2005)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 3\u201318. Springer, Heidelberg (1994)"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0196-6774(82)90004-9","volume":"3","author":"D. Dolev","year":"1982","unstructured":"Dolev, D.: The Byzantine Generals Strike Again. J. Algorithms\u00a03(1), 14\u201330 (1982)","journal-title":"J. Algorithms"},{"key":"1_CR4","unstructured":"Golbeck, J.A.: Computing and applying trust in web-based social networks. University of Maryland, College Park (2005)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Helmy, A.: Small worlds in wireless networks. IEEE communication letters\u00a07(10) (October 2003)","DOI":"10.1109\/LCOMM.2003.818887"},{"key":"1_CR6","unstructured":"J\u00f8sang, A., Gollmann, D., Au, R.: A Method for Access Authorisation Through Delegation Networks. Australasian Information Security Workshop (2006)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-39927-8_20","volume-title":"Information and Communications Security","author":"T.-Y. Li","year":"2003","unstructured":"Li, T.-Y., Zhu, H., Lam, K.-Y.: A Novel Two-Level Trust Model for Grid. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 214\u2013225. Springer, Heidelberg (2003)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-45760-7_16","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"S. Micali","year":"2002","unstructured":"Micali, S., Rivest, R.L.: Transitive Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 236\u2013243. Springer, Heidelberg (2002)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Reiter, M., Stubblebine, S.: Resilient authentication using path in- dependence. IEEE Transactions on computers\u00a047(12) (1998)","DOI":"10.1109\/12.737682"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Subramanian, L., Katz, R.H., Roth, V., Shenker, S., Stoica, I.: Reliable broadcast in unknown fixed-identity networks. In: PODC 2005, pp. 342\u2013351 (2005)","DOI":"10.1145\/1073814.1073880"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Probabilistic Computations: Toward a Unified Measure of Complexity (Extended Abstract). In: FOCS 1977, pp. 222\u2013227 (1977)","DOI":"10.1109\/SFCS.1977.24"},{"issue":"1","key":"1_CR12","first-page":"45","volume":"7","author":"R. Yahalom","year":"1994","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust-Based Navigation in Distribution Systems. Computing Systems\u00a07(1), 45\u201373 (1994)","journal-title":"Computing Systems"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Zhu, H.: New model on undirected transitive signatures. IEE Proceedings of Communication (2004)","DOI":"10.1049\/ip-com:20040330"},{"key":"1_CR14","unstructured":"Zhu, H., Feng, B., Deng, R.H.: Computing of Trust in Distributed Networks (eprint 2003), http:\/\/www.iacr.org"},{"key":"1_CR15","first-page":"200","volume-title":"Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005","author":"H. Zhu","year":"2005","unstructured":"Zhu, H., Bao, F., Li, T.: Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005, pp. 200\u2013209. Springer, Heidelberg (2005)"},{"key":"1_CR16","unstructured":"Zhu, H., Bao, F., Deng, R.H.: Computing of Trust in wireless Networks. In: IEEE Vehicular Technology Conference (2004)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T16:36:04Z","timestamp":1555864564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11909033_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}